Defense Office

from Wikipedia, the free encyclopedia
AustriaAustria Defense Office
- AbwA -
AbwA - Logo.svg
Supervisory authority (s) Federal Ministry for National Defense (BMLV)
Consist since 1985
Headquarters Vienna
Authority management Bgdr Reinhard Ruckenstuhl (interim)
Website Defense Office

The Abwehramt (AbwA) is one of the two intelligence services of the Austrian Armed Forces (ÖBH) and, like its partner service, the Heeres-Nachrichtenamt (HNaA), is subordinate to the Federal Ministry of Defense (BMLV). The Abwehramt serves the "self-protection" of the Armed Forces, ie it should - in accordance with the Military Authorization Act (MBG), which has been in force since July 1, 2001 - intentional attacks on military legal interests (persons, property, secrets) and thus the impairment of military security both domestically as well as in the context of the contingents sent to foreign missions - in cooperation with the security and law enforcement authorities - to detect them early and prevent criminal offenses.

structure

The Defense Office of the Austrian Armed Forces, based at Hetzgasse 2 in Vienna-Landstrasse (3rd district), comprises four departments:

  • Management department (management, intelligence training, information analysis and evaluation, administration, personnel)
  • Department A (military reliability / company review / abroad)
  • Department B (Intelligence Department)
  • Department C (Technical / Electronic Services)

In addition, the AbwA has four branch offices (Abwehrstellen - Ast) in Graz, Salzburg, Linz and Klagenfurt. In addition there are liaison officers and intelligence elements in all foreign missions of the armed forces.

Head of the Defense Office

  • Corps commander Kurt Diglas 1983–1992
  • General manager Werner Lackner 1992–1996
  • Major General Gregor Keller (interim) 1997
  • Brigadier Erich Deutsch 1998–2007
  • Brigadier Ewald Iby (interim) 2007
  • Major General Wolfgang Schneider 2007-2009
  • Major General Edwin Potocnik (interim) 2009–2010
  • Major General Anton Oschep 2010–2014
  • Brigadier Ewald Iby (interim) 2014–2016
  • Brigadier Rudolf Striedinger April 2016 - January 2020
  • Brigadier Reinhard Ruckenstuhl (interim since January 2020)

Current management structure

  • Brigadier Reinhard Ruckenstuhl, interim head of the Defense Office
  • Colonel dG Walter Unger, Head of Department C (Technical / Electronic Services)

tasks

The following current tasks - both domestically and within the framework of foreign contingents - are to be carried out by the Defense Office of the Austrian Armed Forces:

  • Matters of the classic intelligence service defense (defense against espionage, sabotage, other criminal acts) and preparation of the situation report at home and abroad with regard to military security
  • Reliability Check Matters
  • Affairs of the safety officer of the BMLV
  • Matters of the Information Security Act and the Information Security Ordinance in the area of ​​the BMLV
  • Matters of national and international accreditation of the security of information and communication technology systems as a national licensing authority in the military sector ("Security Accreditation Authority" - SAA)
  • Matters of the "electronic defense" (especially the search for eavesdropping devices and malware in information and communication technology systems) and ICT security
  • Cooperation with Austrian authorities as well as foreign intelligence services and agencies with comparable tasks for the purpose of ensuring, maintaining or restoring military security.

The results (mission statement, motto and logo of the Abwehramt) developed in the course of a “corporate identity management process” that was set in motion in 2011 illustrate the extensive AbwA agendas and make them clear.

To review measures to protect the constitutional institutions and their capacity to act, as well as intelligence measures to safeguard national military defense, the respective competent committees of the National Council each elect a standing subcommittee (Art. 52a, Paragraph 1 of the Federal Constitutional Act, Section 32b, Paragraph 1 of the Rules of Procedure, 1975 - GOGNR). The standing subcommittee elected by the National Defense Committee of the National Council meets in principle once every three months and its meetings are usually confidential (Sections 32c, 32d GOGNR).

Following the example of the legal protection officer (RSB-StPO) introduced into the Code of Criminal Procedure (StPO), a legal protection officer (RSB-MBG) was given the (preventive) legal control of the activities of the two intelligence services of the Austrian Armed Forces in the Military Authorization Act (MBG), which has been in force since July 1, 2001 transfer. At present, the corresponding inspection rights and control obligations are being exercised by retired SektChef Alfred Mayer and his two deputies, SenPres of the OGH retired Ernst Markel and Brigadier Karlheinz Probst.

The Legal Protection Commissioner (RSB-MBG) has to submit his reports to the permanent sub-committee of the National Defense Committee of the National Council. Individual planned measures by organs of the intelligence service defense must be reported in advance to the legal protection commissioner at the Federal Minister for National Defense and can only be carried out with his express consent.

Cyber ​​risk matrix 2011

The increasing vulnerability of strategic infrastructures (= organizations or facilities with vital importance for the state community, whose failure / disruption has lasting effects on larger population groups) prompted the Federal Chancellery to launch the “National ICT Security Strategy Austria” in June 2012 and the To publish the “Austrian Strategy for Cybersecurity” (ÖSCS). As part of the Austrian security strategy, they are intended as contrapassive concepts to ensure the protection of cyber space and people in virtual space, taking into account fundamental rights and freedoms. This is to be achieved by installing the necessary structures (coverage of the Cyber ​​Defense area by the BMLV, setting up a military Cyber ​​Emergency Readiness Team (MilCert) at the command support center using the necessary well-trained staff with the task of detecting imminent cyber threats, taking preventive measures and providing help to those affected in the event of a cyber attack) and a CERT network for cyber security.

history

By resolution of the Council of Ministers of April 2, 1985, the defense tasks were separated from the Army Intelligence Service established by the Council of Ministers of March 7, 1972, which until then had been responsible for both the defense area of ​​military security and intelligence intelligence, and became a "domestic intelligence service" - the then newly formed Abwehramt (AbwA) - and the reconnaissance tasks to a "foreign intelligence service" - the newly configured Army Intelligence Agency (HNaA). The subsequent BMLV decree of August 29, 1985 - it regulated the tasks, powers, organization and purpose of the military intelligence services - remained the relevant basis for both intelligence services until the Military Authorities Act (MBG) came into force.

For the successful fulfillment of the duties of the AbwA, its head now gives the following examples:

  • "In the 1980s, the Abwehramt (Abwehramt) identified brisk activity by peace activists who had obtained data by evaluating publicly accessible land registers and surveying books and subsequently providing information on site. As a result, a significant part of the defense arrangements with the integrated permanent installations in the Kleiner Erlauftal were made public.
  • In 1985 a Hungarian defector (an employee of the Hungarian Shipping Company) confessed that he had been commissioned to photograph all known military installations in Upper Austria from the attack side every year and to survey the private situation of high-ranking personalities.
  • In 1989 the AbwA succeeded in working with the state police to arrest two Hungarian “traditional researchers” who, during a combat exercise at the military academy, faked a car breakdown and took photographs of military information boards and command posts.
  • In 1990 a Russian diplomat wanted to win over the managing director of a medical technology company to provide documents on research projects at the Heeresspital Stammersdorf and the research center Seibersdorf .
  • During the Yugoslav crisis in 1991, officers from the Abwehramt and the state police observed a suspected member of the Yugoslav secret service who was conspicuously interested in the barracks in the border area. Targeted spying on barriers as well as ammunition and weapons stores was suspected. [...] Officials of the Abwehramt were also repeatedly used to support the investigations of the state and criminal police. "

Apart from these official statements, reports on the work of the AbwA in conformity with the order can also be found again and again in broader circles accessible to the publication of periodical printed works / media products. B.

  • NN, probation for the spy in uniform : "The Munich Higher Regional Court has an Austrian soldier for espionage (according to his own admission, he worked for the Russian secret service SWR for five years from 1997 and provided information about the 'Tiger' attack helicopter from the manufacturer Eurocopter) Year imprisonment on probation. "
Employees of the German Federal Criminal Police Office and, on the Austrian side, the BVT and the Abwehramt were involved in the investigation, which lasted more than two years before the 2007 arrest of the group of people involved.
  • Alexander Purger (“Salzburger Nachrichten”, Vienna), Heer had two imams exposed : “For years, the Federal Army has been thinking of employing its own Muslim military chaplains for its Turkish recruits. When two imams, who had been named by the Islamic Faith Community, were subjected to the usual reliability test, however, they experienced a nasty surprise: one has been living in Austria for 15 years with forged papers, the other is suspected of being an extremist. The employment of the two was refrained from.
[...] The agency that made this discovery is the Abwehramt - the domestic secret service of the armed forces. The legendary office, which officially only operates as a post office box, revealed some of its secrets for the first time this week [...] The [...] Abwehramt (called the "company" by its employees) has to protect all army facilities from espionage and sabotage attacks and the To protect troops from infiltration by political extremists. This requires intensive cooperation with foreign secret services (which one also consulted on matters relating to imams) and at the same time requires outstanding technical equipment and expertise. Because espionage and sabotage work today primarily through hacker attacks on computers and eavesdropping using highly sensitive wireless microphones.
The Abwehramt's training center in Object 9 of the Schwarzenberg barracks in Salzburg therefore resembles the technical cabinet of wonders of James Bond's super brain Q: 'bugs' in the wiring of sockets, micro cameras in vest buttons, fiber optic microphones in double floors, adapter plugs for 'sucking out' computers, glasses with video cameras in Nose clip. The Abwehramt always gets the latest espionage devices in order to be able to practice their exposure and rendering harmless. Whole model offices and model hotel rooms were set up in Salzburg in order to be able to practice where to look for hidden microphones. - For example under the circuit board of the computer or in a wooden panel of the wall cladding.
[...] To subject a hotel room to a complete 'eavesdropping test', eight specialists from the Abwehramt are employed for a whole day, the work is so laborious. Nevertheless, it is practically impossible to find fiber optic microphones that were already hidden in the wall tiles when the house was built. The only thing that can help is a noise generator, which causes the listener to ring in the ears. All departments at home and abroad (the Austrian military representation in Brussels was already the target of spies), but also the presidential chancellery in the Hofburg, where the commander in chief of the armed forces sits, are checked by the experts of the Abwehramt.
The Abwehramt is only allowed to actively spy in order to track down those hackers who launched a major attack on the Armed Forces Internet server in 2007, and only under the control of a legal protection officer.
According to an EU requirement, the members [-states] are called upon to significantly expand their domestic secret services for the purpose of countering terrorism. A project that has so far failed in Austria due to the budget problems of the army ... "
  • “On July 10, 2009, the National Council set up a committee of inquiry through a joint resolution by all five parliamentary groups to clarify 'wiretapping and influencing measures in the area of ​​parliament'. The committee's investigative mandate comprised three points: Was there illegal surveillance of MPs, spying in the political environment of Parliament, or was there any influence on MPs by foreign secret services? The MP Martin Bartenstein was elected chairman of the committee, which was soon to be referred to as the 'Spy Investigation Committee' . After 17 meetings with the questioning of 36 persons providing information and one expert as well as the evaluation of over 40,000 files, the National Council approved the final report of the committee chair on December 10, 2009.
The committee of inquiry into 'wiretapping and influencing measures in the area of ​​parliament' also examined the question of the monitoring of events in the military environment, including the question of the evaluation of license plates of participants in events related to national military defense. The committee of inquiry came to the conclusion that risk analyzes are necessary in the interests of safeguarding national military defense. As far as required, the consent of the legal protection officer was obtained. Illegals could therefore not be determined, and the deployment of the Abwehramt was proportionate with regard to the legal interests to be protected and the identified danger situation. "

Others

Since 2012, the Abwehramt has been organizing a hacker competition , the Cyber ​​Security Challenge Austria, together with the Ministry of the Interior, Cyber ​​Security Austria, the Safe Austria Board of Trustees and cooperation partners from the education sector, business and others .

literature

  • Peter Fender: Military deployment law - Inland , TRUPPENDIENST-Handbuch, Verlag AV + Astoria, Vienna 2013.
  • Andreas Hauer: Peace, order, security. A study on the tasks of the police in Austria , volume 131 of the research from state and law , Springer Verlag , Vienna 2000.
  • Andreas Hauer, Rudolf Keplinger, Martin Kreutner (eds.): Brief commentary on the Military Authorization Act . (Status: March 1, 2005), Linz / Vienna 2005.
  • Rudolf Keplinger, Martin Kreutner, Günter Sauer: Practical commentary on the military authorization law . (Status: October 1, 2009), ProLibris Verlag, Linz 2010 (commentary on §§ 20 ff., 57 MBG).
  • Reinhard Klaushofer: Structural Issues of Legal Protection Commissioners , Volume 171 of Research on State and Law , Verlag Österreich , Vienna 2012.
  • Karl Platzer: The powers of the intelligence services in Austria, Germany and Switzerland in the field of information technology , Graz 2011, ISBN 978-3-200-02474-8 .
  • Karlheinz Probst: Competencies of the legal protection officer according to MBG and legal protection problems , in Mathias Vogl (Ed.): Eighth Legal Protection Day 2010 , Neuer Wissenschaftlicher Verlag - NWV, Vienna-Graz 2012, 143–150.
  • Markus Purkhart: State Police, Army Intelligence Service and Abwehramt - the Austrian secret services from the perspective of parliamentary transparency and control; a political science analysis of Austrian democracy . Diploma thesis, University of Vienna , 1998.
  • Nicolas Raschauer, Wolfgang Wessely: Commentary on the Military Authorities Act , 2nd edition, Neuer Wissenschaftlicher Verlag - NWV, Vienna 2007 (commentary on §§ 20 ff., 57 MBG).
  • Karl Satzinger: Commentary on the Military Authorization Act , Verlag Österreich, Vienna 2000 (commentary on §§ 20 ff., 57 MBG).
  • Gottfried Strasser: The role of the legal protection officer in the constitution. Any consequences of a current decision by the Constitutional Court: Journal für Strafrecht - JSt 2005, 9-14.
  • Mathias Vogl: The legal protection officer in Austria , Neuer Wissenschaftlicher Verlag - NWV, Vienna 2004.
  • Mathias Vogl: Eighth Legal Protection Day 2010 , Neuer Wissenschaftlicher Verlag - NWV, Vienna-Graz 2012 (143–150).
  • Ewald Wiederin: Privacy and surveillance state - security police and intelligence service data investigations in the light of Art 8 ECHR and Art 9 -10a StGG , Volume 12 of the publications of the Ludwig Boltzmann Institute for Legislative Practice and Legal Application (LBIGR), Manz Verlag, Vienna 2003.

Web links

Individual evidence

  1. a b c d Reinhard Ruckenstuhl heads the Army Defense Agency on an interim basis. In: DerStandard.at . January 13, 2020, accessed January 13, 2020 .
  2. Anton Oschep , 25 years Abwehramt, Österreichische Militärische Zeitschrift - ÖMZ 1/2011, 48 ff., With a description (which does not claim to be complete) of the development from 1955 to today. The changes in the tasks of the defense ministry from its beginnings up to the implementation of the recommendations of the Armed Forces Reform Commission in 2010 and to carry out a mission statement process makes comprehensible vividly: id. , Tasks and mission statement Abwehramt: TRUPPENDIENST - episode 329, issue 5/2012; to be compared are: NN , The emergence of the Austrian intelligence services: http://www.bmlv.gv.at/organisation/beitraege/n_dienste/index.shtml , which contains details on the career, fundamentals, tasks and activities of the Austrian intelligence services ; Miliz-Info-Redaktion , Heeres-Nachrichtenamt, Miliz-info 2/2011, 18; AbwA , The Abwehramt - more than an intelligence service, Miliz-info 2/2012, 5 f. Peter Fender , Intelligence Service Defense, in ders ., Military Operations Law - Inland, TRUPPENDIENST-Handbuch (2013) 109 f.
  3. Federal Act on Tasks and Powers in the Framework of Military National Defense (Military Authority Act - MBG), Federal Law Gazette I 2000/86 as amended, RIS; enlightening Rudolf Keplinger, Martin Kreutner, Günter Sauer : Practical commentary on the Military Authorization Act. (As of October 1, 2009); and in more detail Nicolas Raschauer , foundations of the Austrian military constitution, in ders., Wolfgang Wessely : Commentary on the Military Authorization Act² (2007) 17 ff; Anton Oschep , (FN 1): TRUPPENDIENST - episode 329, issue 5/2012 names [legal] principles of the AbwA's actions in its [more recent] development history . In this regard, cf. the “Military Law Text Edition ” published by the BMLVS Department of Self-Legislation : Military Law (Status: January 1, 2014; PDF; 232 kB).
  4. On military reliability tests and company reviews, cf. AbwA , The Military Reliability Test: TRUPPENDIENST - Episode 327, Edition 3/2012; and also Ewald Wiederin : Privacy and Monitoring State (2003) 182 ff.
  5. BMLVS press release (ÖBH-Aktuell: bmlv.gv.at April 1, 2016, accessed on April 4, 2016), Rudolf Striedinger becomes the new head of the Abwehramt.
  6. In-depth on the procurement, processing, evaluation and presentation of information about potential threats = the classic task of defensive intelligence services see AbwA , Information Security and Espionage: TRUPPENDIENST - Volume 326, Edition 2/2012; and Ewald Wiederin : Privacy and Monitoring State (2003) 151 ff.
  7. ^ Federal Act on the Implementation of International Law Obligations for the Secure Use of Information (Information Security Act - InfoSiG), Federal Law Gazette I 2002/23 as amended, RIS; Ordinance of the Federal Government on Information Security (Information Security Ordinance - InfoSiV), BGBl II 2003/548 as amended, RIS; Ordinance of the Federal Minister for National Defense on the Issuance of Safety Clearance Certificates (SUBV), Federal Law Gazette II 2006/195 as amended, RIS; AbwA , The (new) Secret Protection Ordinance: TRUPPENDIENST - Volume 324, Edition 6/2011. Peter Fender , Secret Protection , in his . , Military Law of Operations - Inland: TRUPPENDIENST-Handbuch (2013) 110 ff.
  8. Anton Oschep , Electronic Defense and ICT security, in: . DERS , (FN 1) ÖMZ 1/2011, 51 f .; Walter Unger , Cyber ​​Defense - A Military Challenge, ÖMZ 6/2012, 698–704; Manfred Schleinzer , ICT Security Conference - Networks as the foundation of tomorrow's successes: Der Soldat 24 (December 19) 2012, 1; Alexander Löw , Cyber ​​War and Cyber ​​Defense: TRUPPENDIENST - episode 326, issue 2/2012; Karl-Heinz Leitner , European Forum Alpbach 2013 - Cyberwar (conference report): Der Soldat 17 (September 11th) 2013, 1 f .; AbwA / ICT security , The human factor in ICT and information security: TRUPPENDIENST - Volume 314, Issue 2/2010; that. , The site for information security on the intranet: TRUPPENDIENST - Episode 315, Issue 3/2010; that. , passwords, the neglected keys: TRUPPENDIENST - Episode 316, Edition 4/2010; that. , data backup - what for ?: TRUPPENDIENST - episode 317, edition 5/2010; that. , STUXNET - A Cyber ​​War Attack Program ?: TRUPPENDIENST - Episode 320, Edition 2/2011; that. , The threat to the strategic ICT structure: TRUPPENDIENST - Volume 330, Edition 6/2012; that. , locked out: TRUPPENDIENST - episode 331, issue 1/2013 that. , Photography - (not) a threat to military security: TRUPPENDIENST - episode 332, issue 2/2013.
  9. To the fact that "all parties represented in the Austrian parliament in the framework of the Armed Forces Reform Commission recommended intensifying international intelligence cooperation," refers Othmar Commenda . Too much transparency plays into the hands of those who want to harm us: Wiener Zeitung Online 19 November 2013, http: //wienerzeitung.at,/  ( page no longer available , search in web archivesInfo: The link was automatically marked as defective. Please check the link according to the instructions and then remove this notice. Retrieved July 9, 2014.@1@ 2Template: Toter Link / wienerzeitung.at  
  10. On the mission statement process, mission statement and logo of the Abwehramt, see Anton Oschep , (FN1): TRUPPENDIENST - Episode 329, Edition 5/2012.
  11. Standing sub-committees for monitoring the intelligence services parlament.gv.at, accessed on June 19, 2013
  12. In its decision of January 23, 2004, G 363/02, the Constitutional Court stated: “The legal protection officer is a legal protection institution which - considering the fundamental rights of the interventions triggering this control - aims to do this in the interests of those affected to ensure constitutionally required minimum of factual effectiveness of judicial review in measures of intelligence reconnaissance or defense. "the arrangements for the legal protection officers in the Code of Criminal Procedure (CCP), the security police Act (SPG) and the military powers Act (MBG) explains Gottfried Strasser , the role of the legal protection Supervisor in the constitution. Possible consequences [of] the decision of the Constitutional Court [of January 23, 2004, G 363/02]: Journal für Strafrecht - JSt 2005, 9-14. A current catalog of tasks for the RSB-MBG can be found in: Reinhard Klaushofer , structural questions of the legal protection officers (2012) p. 38. A comparison of the respective areas of responsibility of the RSB can be found in: Reinhard Klaushofer , structural questions of the legal protection officers (2012) p. 220 ff.
  13. On this in detail Christoph Ulrich , 10th Legal Protection Day [of the Federal Ministry of the Interior], Der Soldat 24 (December 19) 2012, 10; ders. , 11th Legal Protection Day of the Federal Ministry of the Interior, Der Soldat 23 (December 4) 2013, 5; more detailed: the same , legal protection officer according to § 57 MBG, Miliz-info 4/2013, 2.
  14. http://db.amtskalender.com/2/28/10/7/  ( page no longer available , search in web archivesInfo: The link was automatically marked as defective. Please check the link according to the instructions and then remove this notice. , accessed February 27, 2013.@1@ 2Template: Toter Link / db.amtskalender.com  
  15. On the authority and control of the intelligence service bodies, see Anton Oschep , (FN 1), ÖMZ 1/2011, 52 f .; Christoph Ulrich , (FN 13), 10; ders. , New report of the legal protection officer, Der Soldat 7 (April 10th) 2013, 7. Karlheinz Probst , competencies of the legal protection officer according to MBG and legal protection problems, gives insights into the work of the RSB in Mathias Vogl (ed.): Achter Rechtsschetztag 2010 ( 2012) 143–150.
  16. ↑ In detail, Udo Ladinig , Herbert Saurugg , Blackout: TRUPPENDIENST - Follows 325–329, issues 1–5 / 2012 with further references. Herbert Saurugg , Blackout - Still up to date ?: TRUPPENDIENST - Episode 337, Issue 1/2014. The program for the protection of critical infrastructures is embedded in the concept of comprehensive services of general interest (= resolution of the liaison officers to the National Security Council, October 9, 2005) (fundamentally the master plan: Austrian Program for Critical Infrastructure Protection ( Memento from 8. August 2014 in the Internet Archive ) - APCIP).
  17. Instructive: - ( Memento of the original dated December 2, 2013 in the Internet Archive ) Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice. and http://www.digitales.oesterreich.gv.at/ as well as - ( Memento of the original dated May 6, 2013 in the Internet Archive ) Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice. . Impressive: Cyber ​​Risk Matrix 2011 ( Memento of the original from May 6, 2013 in the Internet Archive ) Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice. = Annex 1 to the Austrian Strategy for Cyber ​​Security (ÖSCS). Farsam Salimi , Toothless Cyber Criminal Law, conclusively answered the question of whether the facts of substantive criminal law offer the state sufficient opportunities to react to cyberattacks that society considers punishable. An analysis of the judicial criminal offenses for data and secrecy protection, Österreichische Juristen-Zeitung - ÖJZ 2012/115 mwN. @1@ 2Template: Webachiv / IABot / www.oesterreich.gv.at @1@ 2Template: Webachiv / IABot / www.bka.gv.at @1@ 2Template: Webachiv / IABot / www.bka.gv.at
  18. Enlightenment on this and the threat in cyberspace: Resolution of the National Council of July 3, 2013 (regarding a new Austrian security strategy) in: Federal Chancellery (Ed.), Austrian Security Strategy , Security in a New Decade - Shaping Security (Vienna, July 2013) 17 ff. ( - ( Memento of the original from January 10, 2014 in the Internet Archive ) Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this note. ) Retrieved on December 9, 2013 : “On March 1, 2011, the federal government acknowledged and approved the report on an Austrian security strategy. The report was forwarded to Parliament for further debate. On the basis of this report, on July 3, 2013, the National Council adopted a majority resolution on a new Austrian security strategy and asked the Federal Government to amend Austrian security policy in accordance with the general recommendations set out in the resolution and the recommendations on internal security, foreign policy aspects of security policy and defense policy The Austrian Security Strategy Text can also be found online at: http://www.bmlv.gv.at/wissen-forschung/publikationen/publikation.php?id=663 . For an overview, Christoph Ulrich , Austrian security strategy: Militia info 1/2014, 9 ff. @1@ 2Template: Webachiv / IABot / www.bka.gv.at
  19. Udo Ladinig , Herbert Saurugg , (FN 16), passim, gives more detailed explanations on the new military field of concentrated cyber attack against state structures ; Udo Ladinig , Cyber-War, A modern form of threat : TRUPPENDIENST - Volume 334, Issue 4/2013 with further information; AbwA / IKT-Sicherheit , The Threat of the Strategic ICT Structure: TRUPPENDIENST - Volume 330, Edition 6/2012; on the merger of the individual CERTs in Austria (CERT.at, Federal Computing Center, CERT of the City of Vienna, GovCERT of the public administration, R-IT CERT {Raiffeisen Informatik}, CERT of the Austrian Science Network, milCERT) see NN , Austria - CERT-Verbund für Cyber ​​security: http://www.futurezone.at/netzpolitik/5888-oesterreich-cert-verbund-fuer-cyber-sicherheit.php  ( page no longer available , search in web archivesInfo: The link was automatically marked as defective . Please check the link according to the instructions and then remove this notice. ; Peter Glaser , Cyberwar - The silent world war: http://www.futurezone.at/meinung/9616-cyberwar-der-stille-weltkrieg.php  ( page no longer available , search in web archivesInfo: The link was automatically defective marked. Please check the link according to the instructions and then remove this notice. . Miliz-Info-Redaktion , Cyber ​​Defense, Miliz-info 4/2013, 3 .; The CERT network for cyber security is involved in the development of a national cyber security strategy for Austria; in detail: Report Internet Security Austria 2013: http://www.cert.at/static/downloads/reports/cert.at-jahresbericht-2013.pdf ; and Cyber ​​Security Report 2014: https://web.archive.org/web/20140716185444/http://www.bka.gv.at/DocView.axd?CobId=55935 . In addition, national security initiatives are presented on the electronically accessible ICT security portal ( http://www.onlinesicherheit.gv.at) ./  ( page no longer available , search in web archivesInfo: The link was automatically marked as defective. Please check the link according to the instructions and then remove this notice. This is an inter-ministerial initiative in cooperation with the Austrian economy for topics related to the security of information and communication technology. As a strategic measure of the national ICT security strategy, the ICT security portal pursues the goal of promoting and sustainably strengthening the ICT security culture in Austria by sensitizing and raising awareness of the target groups concerned and by providing target group-specific recommendations for action. With its range of information, it is intended to support the safe development, safe operation and safe use of information and communication technology.@1@ 2Template: Toter Link / www.futurezone.at  @1@ 2Template: Toter Link / www.futurezone.at  @1@ 2Template: Dead Link / www.onlinesicherheit.gv.at  
  20. Anton Oschep , activities of the immune Office in: id. , (FN 1) ÖMZ 1/2011, 49 f. mwN.
  21. To delimit: Andreas Hauer , rest, order, security (2000) 358 ff .; The relationship between the intelligence service and the security police is also examined by Ewald Wiederin , Datenschutz und Kontrollstaat (2003) 164 ff.
  22. http: //www.oberpfalznetz.de,/  ( page no longer available , search in web archivesInfo: The link was automatically marked as defective. Please check the link according to the instructions and then remove this notice. Retrieved March 2, 2011@1@ 2Template: Toter Link / www.oberpfalznetz.de  
  23. cf. Kurt Kuch , Russian espionage affair uncovered - Abwehramt and BVT [= Federal Office for the Protection of the Constitution and Fight against Terrorism] jointly successful, "News" 24/07, 34.
  24. http: //www.salzburg.com,/  ( page no longer available , search in web archivesInfo: The link was automatically marked as defective. Please check the link according to the instructions and then remove this notice. accessed on November 29, 2008. On the discovery of manipulated telephones in the course of a routine check in the ministerial offices , see Martin Fritzl , […] The spied minister , accessed on August 12, 2013.@1@ 2Template: Dead Link / www.salzburg.com  
  25. cf. Communiqué of the Committee of Inquiry into the investigation of wiretapping and influencing measures in the area of ​​Parliament (71 / GO XXIV. GP) Minutes of the Committee of Inquiry (71 / GO) Part 1, 16th meeting, 26 November 2009, public part ( http: // www. parlament.gv.at) ./  ( Page no longer available , search in web archivesInfo: The link was automatically marked as defective. Please check the link according to the instructions and then remove this notice.@1@ 2Template: Toter Link / www.parlament.gv.at  
  26. Österreichisches Abwehramt scouting Hacker format.at, accessed on November 25, 2013.
  27. Looking for young local hackers futurezone.at, accessed on November 8, 2013
  28. ÖBH-Aktuell 8 November 2013, Cyber ​​Security Week of the Armed Forces ends with Länderkampf, http://www.bmlv.gv.at/cms/artikel.php?ID=6870 , accessed on 11 November 2013
  29. Dietmar Rust , Cyber ​​Security Week of the Federal Armed Forces (conference report): Der Soldat 23 (December 4) 2013, 11.
  30. An inter-ministerial initiative in cooperation with the Austrian economy, see FN 19